First published: Thu Oct 22 2020(Updated: )
A divide-by-zero issue was found in QEMU in the dwc-hsotg (dwc2) USB host controller emulation. More specifically, HCCHAR_MPS was read from a device register and later used as divisor without performing any sanity check. This could allow a malicious/buggy guest to crash the QEMU process on the host, resulting in a denial of service. Upstream fix: <a href="https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg04263.html">https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg04263.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1890653 is considered high due to its potential to crash the QEMU process.
To fix REDHAT-BUG-1890653, update to the latest version of QEMU that addresses this divide-by-zero vulnerability.
REDHAT-BUG-1890653 is caused by a divide-by-zero error in the USB host controller emulation in QEMU.
The potential impacts of REDHAT-BUG-1890653 include crashing the QEMU process and affecting the stability of the host system.
The affected software for REDHAT-BUG-1890653 is QEMU.